期刊文献+

基于IPFIX的用户网络行为分析系统模型研究 被引量:2

Research on IPFIX-Based System Model of Users' Network Behaviors Analysis
下载PDF
导出
摘要 网络行为分析是网络安全领域的研究热点。论文以用户使用网络资源产生的流量为依据,对用户的网络行为进行了分类,然后基于正在标准化中与设备不相关的IP数据流信息输出(IPFIX)协议,提出了一种用户网络行为分析系统模型,研究了模型中采集点、收集器、分析器的关键技术,并对模型的性能进行了分析。该系统模型具有良好的灵活性和扩展性,并且易于实现,对于网络检测、异常行为发现,以及网络整体规划、网络资源利用等方面都有着重要的意义。 Network behaviors analysis is the hot spots of network security.It presents a taxonomy of users' network behaviors that is based on the traffic which is generated by users using network resources.Then based on IPFIX protocol,a system model of users' network behaviors analysis is proposed,the key technologies in this model are studied,and the model's performance is analyzed.The proposed model has good flexibility and scalability,also easy to implement.It is significant to the aspects of network measuring,abnormal behaviors discovering,network planning and network resource utilization.
出处 《计算机技术与发展》 2011年第9期233-236,241,共5页 Computer Technology and Development
基金 国家自然科学基金(60833002) 中央高校基本科研业务费专项资金(2011JBM016)
关键词 网络行为分析 网络流量 IP数据流信息输出 网络安全 network behaviors analysis network traffic IPFIX network security
  • 相关文献

参考文献14

  • 1Shu Y L,Andy J. Network Anomaly Detection System; The State of Art of Network Behaviour Analysis [ C ]//International Conference on Convergence and Hybrid Information Technology. Korea: [ s. n] ,200g.
  • 2岑荣伟,刘奕群,张敏,茹立云,马少平.基于日志挖掘的搜索引擎用户行为分析[J].中文信息学报,2010,24(3):49-54. 被引量:31
  • 3Zeng Bin,Zhang Dafang,Li Wenwei,et al. Design and Implementation of a Network Behavior Analysis- Oriented IP Network Measurement System [ C ]//the 9th International Conference for Young Computer Scientists. China: [ s. n. ]2008.
  • 4马延鹏,苏金树,王勇军.一种基于IPFIX协议的网络行为分析方法[J].福建电脑,2008,24(11):150-151. 被引量:2
  • 5Leinen S. Evaluation of Candidate Protocols for IP Flow Information Export (IPFIX) : IETF RFC 3955[S/OL]. 2004- 10. http ://www. ietf. org,/rfc/rfc3955, txt.
  • 6马力,焦李成,董富强.一种Internet的网络用户行为分析方法的研究[J].微电子学与计算机,2005,22(7):124-126. 被引量:22
  • 7中国城市网民行为与互联网市场演进研究报告[EB/OL].2003.http://jiuban.chinalabs.com/cache/doc/03/05/15/88.shtml.
  • 8Cisco Netflow Version 9 [ EB/OL ]. 2004. http ://www. cisco. com/en/US/products/ps6645/products_ios_protocol_option_home, html.
  • 9Farzaneh F,Mohammad H Y. Design and Implementation of a Monitoring System Based on IPFIX Protocol [ C l// The Third Advanced International Conference on Telecommunications. Mauritius: [ s. n. ] ,2007.
  • 10Claise B. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information: IETF RFC 5101[S/OL]. 2008-01. http://www. ietf. org/rfc/rfc5101, txt.

二级参考文献33

  • 1余慧佳,刘奕群,张敏,茹立云,马少平.基于大规模日志分析的搜索引擎用户行为分析[J].中文信息学报,2007,21(1):109-114. 被引量:117
  • 2CNNIC (China Internet Network Information Center).The 25st report in development of Internet in China[R].http://www.cnnic.net.cn/uploadfiles/pdf/2010/1/15/101600.pdf.2010.
  • 3Cockburn,A.and Jones,S.Which way now? Analysing and easing inadequacies in WWW navigation[J].International Journal of Human-Computer Studies,1996,45,105-129.
  • 4Tauscher,L.,& Greenberg,S.How people revisitweb pages:Empirical findings and implications for the design of history systems[J].International Journal of Human-Computer Studies,1997,47,97-137.
  • 5Craig Silverstein,Monika Henzinger,Hannes Marais,et al.Analysis of a very large Web search engine query log[C]//SIGIR Forum,1998,33 (1):6-12.
  • 6Agichtein E,Brill E,Dumais S.Improving web search ranking by incorporating user behavior information[C]//SIGIR06,New York,NY,USA,2006:19-26.
  • 7Dou Z,Song R,Yuan X,Wen J.Are click-through data adequate for learning web search rankings?[C]//Proceeding of the CIKM '08.ACM,New York,NY,2008:73-8.
  • 8Danny Sullivan,Search Engine Sizes[R].In search engine watch website,http://searchenginewatch.com/reports/article,php/2156481.
  • 9Joachims T,Granka L,Pan B,Hembrooke H,Gay G.Accurately interpreting clickthrough data as implicit feedback[C]//Proceedings of the SIGIR'05.ACM,New York,NY,2005,154-161.
  • 10Downey,D.,Dumais,S.,Liebling,D.,and Horvitz,E.2008.Understanding the relationship between searchers' queries and information goals[C]//Proceeding of the CIKM ' 08.ACM,New York,NY,2008:449-458.

共引文献63

同被引文献10

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部